Same thing can happen with many threats that now put poor AutoIT to a malicious use. AutoIT is a software that allows advanced users to write scripts. I have seen now at least 2000-3000 variants of different threats, not even one, but many (it has become common practice) to put AutoIT executable on the system and load a malicious script. Anti-exes will then be powerless... another example is Java malware, where completely harmless executable (javaw.exe) will be instructed to perform harmful actions and we can keep giving examples till tomorrow. That’s why it’s very important to analyse whole chain of events, and fortify multi-layered security.Some semi-advanced users may think that anti-exe solutions can protect them without the AV. This is not true. There are some well known methods of bypassing such protection. For example via the email archive attachments that contain the legal but vulnerable EXE file + malicious DLL (DLL hijacking). The anti-exe can check the legal EXE file, but do not check DLLs that are loaded by this EXE.